First published: Mon Aug 30 2021(Updated: )
A DMA reentrancy issue was found in the EHCI controller emulation of QEMU. From <a href="https://gitlab.com/qemu-project/qemu/-/issues/541">https://gitlab.com/qemu-project/qemu/-/issues/541</a>: """ When EHCI tries to transfer the USB packets, it doesn't check if the Buffer Pointer is overlapped with its MMIO region. So crafted content may be written to the controller's registers and trigger actions like reset, but the device is still transferring packets. """ This flaw could enable a malicious guest to crash QEMU, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. For more information (stack trace, reproducer) see the aforementioned upstream issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <7.0.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =8.0 | |
debian/qemu | <=1:5.2+dfsg-11+deb11u3<=1:5.2+dfsg-11+deb11u2 | 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-2 1:9.2.0+ds-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3750 is a vulnerability in the USB EHCI controller emulation of QEMU that allows crafted content to be written to the controller's registers and trigger undesirable actions.
CVE-2021-3750 has a severity rating of 8.2 out of 10.
CVE-2021-3750 affects QEMU's USB EHCI controller emulation.
To fix CVE-2021-3750, update QEMU to version 7.0.0 or later.
More information about CVE-2021-3750 can be found at the following references: [link1](https://gitlab.com/qemu-project/qemu/-/issues/541), [link2](https://gitlab.com/qemu-project/qemu/-/issues/556), [link3](https://lists.nongnu.org/archive/html/qemu-devel/2021-08/msg03692.html).